Apress Android Sale

Machine Learning and Data Mining for Computer Security

Methods and Applications

By Marcus A. Maloof

  • eBook Price: $139.00
Buy eBook Buy Print Book

Machine Learning and Data Mining for Computer Security Cover Image

  • Add to Wishlist
  • ISBN13: 978-1-8462-8029-0
  • 228 Pages
  • User Level: Science
  • Publication Date: February 28, 2006
  • Available eBook Formats: PDF

Related Titles

  • Information Systems and Neuroscience
  • BPM - Driving Innovation in a Digital World
  • Data-Driven Process Discovery and Analysis
  • Physical Asset Management
  • Transactions on Large-Scale Data- and Knowledge-Centered Systems XVIII
  • UML @ Classroom
  • AIDA-CMK: Multi-Algorithm Optimization Kernel Applied to Analog IC Sizing
  • Computational Color Imaging
  • Uncertainty Quantification in Computational Fluid Dynamics and Aircraft Engines
  • Non-Linear Finite Element Analysis in Structural Mechanics
Full Description
'Machine Learning and Data Mining for Computer Security' provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security. The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables. This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.
Table of Contents

Table of Contents

  1. Introduction.
  2. Some Basic Concepts of Machine Learning and Data Mining.
  3. Learning to Detect Malicious Executables.
  4. Data Mining Applied to Intrusion Detection: MITRE Experiences.
  5. Intrusion Detection Alarm Clustering.
  6. Behavioural Features for Network Anomaly Detection.
  7. Cost
  8. sensitive Modeling for Intrusion Detection.
  9. Data Cleaning and Enriched Representations for Anomaly Detection in System Calls.
  10. A Decision
  11. Theoretic, Semi
  12. supervised Model for Intrusion Detection.

Please Login to submit errata.

No errata are currently published


    1. Pro SQL Server Internals


      View Details

    2. Beginning 3D Game Development with Unity 4


      View Details

    3. Beginning iPhone Development with Swift


      View Details

    4. Financial Modeling for Business Owners and Entrepreneurs


      View Details